A security framework for mobile agent systems

被引:0
|
作者
Samet, Donies [1 ]
Ktata, Farah Barika [2 ]
Ghedira, Khaled [3 ]
机构
[1] Univ Manouba, Natl Sch Comp Sci ENSI, Tunis, Tunisia
[2] Higher Inst Appl Sci & Technol Sousse, Sousse, Tunisia
[3] Honoris United Univ, Univ Cent Tunis, Tunis, Tunisia
关键词
Mobile agent system; Security; MA-UML profile; Cooperative attacks; MULTIAGENT SYSTEMS; ACCESS-CONTROL; MODEL;
D O I
10.1007/s10515-023-00408-7
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security is a very important challenge in mobile agent systems due to the strong dependence of agents on the platform and vice versa. According to recent studies, most current mobile agent platforms suffer from significant limitations in terms of security when they face Denial of Service (DOS) attacks. Current security solutions even provided by the mobile agent platforms or by the literature focus essentially on individual attacks and are mainly based on static models that present a lack of the permissions definition and are not detailed enough to face collaborative DOS attacks executed by multiple agents or users. This paper presents a security framework that adds security defenses to mobile agent platforms. The proposed security framework implements a standard security model described using MA-UML (Mobile Agent-Unified Modeling Language) notations. The framework lets the administrator (of agents' place) define a precise and fine-grained authorization policy to defend against DOS attacks. The authorization enforcement in the proposed framework is dynamic : the authorization decisions executed by the proposed framework are based upon run-time parameters like the amount of activity of an agent. We implement an experiment on a mobile agent system of e-marketplaces. Given that we focus essentially on the availability criterion, the performance of the proposed framework on a place is evaluated against DOS and DDOS attacks and investigated in terms of duration of execution that is the availability of the place.
引用
收藏
页数:36
相关论文
共 50 条
  • [21] An open secure Mobile Agent framework for systems management
    Bellavista P.
    Corradi A.
    Stefanelli C.
    Journal of Network and Systems Management, 1999, 7 (3) : 323 - 339
  • [22] Security Schemes for a Mobile Agent Based Network and System Management Framework
    Ching-hang Fong
    Gerard Parr
    Philip Morrow
    Journal of Network and Systems Management, 2011, 19 : 230 - 256
  • [23] Open secure mobile agent framework for systems management
    Bellavista, Paolo
    Corradi, Antonio
    Stefanelli, Cesare
    Journal of Network and Systems Management, 1999, 7 (03): : 323 - 339
  • [24] Security Schemes for a Mobile Agent Based Network and System Management Framework
    Fong, Ching-hang
    Parr, Gerard
    Morrow, Philip
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2011, 19 (02) : 230 - 256
  • [25] Wrapper-based security monitoring framework in mobile agent system
    Liu, S.P.
    Zhang, S.Y.
    Wu, C.R.
    Ruan Jian Xue Bao/Journal of Software, 2001, 12 (SUPPL.): : 107 - 112
  • [26] Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET
    Rath, Mamata
    Pattanayak, Binod Kumar
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (01) : 46 - 58
  • [27] MobileTrust: a trust enhanced security architecture for mobile agent systems
    Ching Lin
    Vijay Varadharajan
    International Journal of Information Security, 2010, 9 : 153 - 178
  • [28] MobileTrust: a trust enhanced security architecture for mobile agent systems
    Lin, Ching
    Varadharajan, Vijay
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (03) : 153 - 178
  • [29] An approach to designing security model for mobile agent based systems
    Varadharajan, V
    Kumar, N
    Mu, Y
    GLOBECOM 98: IEEE GLOBECOM 1998 - CONFERENCE RECORD, VOLS 1-6: THE BRIDGE TO GLOBAL INTEGRATION, 1998, : 1600 - 1606
  • [30] A Framework for Enhancing Security and Privacy on Unmodified Mobile Operating Systems
    Krupp, Brian
    Sridhar, Nigamanth
    Zhao, Wenbing
    2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, : 404 - 409